Monthly Archives: July 2021
Threat + Vulnerability + Risk = Exploit
A ‘best practice’ is to prioritize your cyber security time and efforts, such as prioritizing issues that may arise. There are many ways of categorizing vulnerabilities such as by Critical, High, Medium, et cetera and…
Work From Home
Rather than fighting the move to long-term remote work post-COVID, these companies have embraced the opportunity it provides to cut costs and increase employee satisfaction and productivity. Here are some of the companies listed out…
Password Management
Password Management is simply a set of principles using best practices to efficiently create and manage passwords to prevent unauthorized access. STRENGTH The recommendations for creating a strong password are to include: Lower Case Characters…
InfoSec vs CyberSec
There are many debates and discussions on this topic. There are those that only use the term “Information Security” or InfoSec to encompass all, and those that specifically use the term “Cyber Security” or CyberSec…
Virtual Private Network
A Virtual Private Network [VPN] is a method in which to connect to the internet privately & securely while encrypting your internet traffic to protect your online identity. There are 2 types of VPN: Personal…
Cyber Security Awareness
Security Awareness is about enlightening end users regarding their roles and responsibilities in relation to Cyber Security [CyberSec] policies, procedures, guidelines, and best practices in order to protect assets and data. Security Awareness Training can…
Wi-Fi Basics
Wi-Fi is a wireless network that follows specific 802.11 IEEE standards and protocols used for Local Area Network [LAN] devices and internet access allowing the exchange of encrypted data via radio waves. The standard home…